Você está na página 1de 7

HANDOUT IN EMPOWERMENT TECHNOLOGY

Information and Communication Technologies

-- deals with the use of different communication technologies such as mobile phones, telephone, internet…

to locate, save, send and edit information

--example: when we make video call, we use internet

ICT IN THE PHILIPPINES

--Philippines as “ ICT Hub of Asia”

--huge growth of ICT related jobs around the country

--ex. call center or Business Process Outsourcing

INTERNET

--- is the global system of interconnected computer networks that uses protocol suite to connect billions of devices worldwide

means of connecting a computer to any other computer anywhere in the world via dedicated routers or servers

World Wide Web

--invented by Tim-Berners Lee

an information space where documents and other web resources are identified by URLs, interlinked by hypertext links and can
be accessed via internet

Web Pages

--a hypertext document connected to the world wide web

Web Sites

--a location connected to the internet that maintains one or more pages on the world wide web

Web Browser

--it displays a web page on a monitor or mobile device

--a software application for retrieving, presenting and traversing information on the world wide web
--there are 106.8 cellphones per 100 Filipinos in the year 2012 ( according to Measuring Information Society)

shares 19.3% of the total employment population in the country ( gathered by the Annual Survey of the Philippine Business
and Industries)

--one of the two cities in the country considered as the “ Selfiest Citiest Around the World” from Time Magazines

--ICT is an ever-changing field that makes the world a smaller place wherein the information is swiftly exchanging with different
comminucation enabled devices which includes the internet.

3 Components of ICT are:

1. Information

2. Communication

3. Technology

INFORMATION

--valuable context that gives meaning and relevance to many people such as name of place, birth date, color, money, your name,
depending on the context. Technically, information is referred as data (once processed in a computer) which is accurate and
timely committed and organized for a purpose

COMMUNICATION

--the conveying of information between two or more people in different places. Technically, communication facilitates the
communication between individuals and groups using smart phones, features phones, tablets, radio, television, and all
computer based technology

TECHNOLOGY

--means of devoting to create new tools to accomplish various tasks in our daily lives. Typically, technology can be described as a
product, processes, organization, models, prototypes, arts and services

WEB 2.0

--is a term coined by Darcy DiNucci on January 1999.

- is the evolution of Web 1.0

- allows the user to interact with the page known as DYNAMIC PAGE: instead of just reading a page, the user may be able to
comment or create a user account. Dynamic Page refers to the web pages that are affected by user input or preference.

Examples of Web 2.0

Social Networking Sites

- Blogs

- Wikis

- Video sharing sites

- Hosted services

- Web applications
KEY FEATURES OF WEB 2.0

1. Folksonomy - allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging). Popular
social networking sites such as Twitter, Instagram, Facebook, etc. use tags that start with the pound sign (#) a.k.a. hashtags.

2. Rich User Experience - content is dynamic and is responsive to user's input. An example would be a website that shows local
content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website.

3.User Participation - the owner of the website is not the only one who is able to put content. Others are able to place a content
of their own by means of comments, reviews, and evaluation.

4. Long Tail - services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a
data plan that charges you for the amount you spent in the Internet, or a data plan that charges you for the amount of
bandwidth you used.

5. Software as a service - users will subscribe to a software only when needed rather than purchasing them. Software as a
service allows you to “rent” a software for a minimal fee.

6. Mass Participation - diverse information sharing through universal web access.

Semantic Web - is a movement led by the World Wide Web Consortium (W3C). The Semantic Web provides a common
framework that allows data to be shared and reused across application, enterprise, and community boundaries.

TRENDS IN ICT

1. Convergence or Technological Convergence

- is the synergy of technological advancements to work on a similar goal or task.

- is using several technologies to accomplish a task conveniently.

Example:

Using your smartphone to create word documents.

Using cloud technologies to sync files from one device to another while using LTE technology which means you can access your
files anytime, anywhere.

2. Social Media - is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and
exchange user-generated content.

Six (6) types of social media

a. Social Networks - these are sites that allow you to connect with other people with the same interests or background. Once a
user creates his or her account, he or she can set up a profile, add people, create groups, and share content.

Examples: Facebook and Google+

b. Bookmarking Sites - these are sites that allow you to store and manage links to various websites and resources. Most of these
sites allow you to create a tag that allows you and others to easily search or share them.

Examples: StumbleUpon and Pinterest

c. Social News - these are sites that allow users to post their own news items or links to other news sources. The users can also
comment on the post and comments may also be ranked.

Examples: reddit and Digg

d. Media Sharing - these are sites that allow you to upload and share media content like images, music, and video.

Examples: Flicker, YouTube, and Instagram


e. Microblogging - these are sites that focus on short updates from the user. Those subscribed to the user will be able to receive
these updates.

Examples: Twitter and Plurk

f. Blogs and Forums - these websites allow users to post their content. Other users are able to comment on the said topic.

Example: Blogger, WordPress and Tumblr

3. Mobile Technologies - the popularities of smartphones and tablets has taken a major rise over the years. This is largely
because of the devices capability to do the tasks that were originally found in PCs.

MOBILE OS

a. iOS - used in Apple devices such as iPhone and iPad.

b. Android - an open source operating system developed by Google. Being open source means several mobile phone campanies
use this OS free.

c. Blackberry OS - used in Blackberry devices.

d. Windows Phone OS - a closed source and proprietary operating system developed by Microsoft®.

e. Symbian - the original smartphone OS; used by Nokia devices.

f. WebOS - originally used for smartphones; now used for smart TVs.

g. Windows Media - developed by Microsoft® for smartphones and pockets PCs.

4. Assistive Media - is non profit service designed to help people who have visual and reading impairments.

Example: A database audio recordings is used to read to the user.

RULES OF NETIQUETTE

--Online Security

--Internet threats

--Protecting reputations online

--Copyright

--Contextualized online search and research skills

\The Internet, truly is a powerful tool. It can be used to promote business, gain new friends, and stay in touch with the old ones.

The Internet is defined as the information superhighway.

Tips to Stay Safe Online

1. Be mindful of what you share and what site you share it to.

2. Do not just accept terms and conditions; read it.

3. Check out the privacy policy page of a website.

4. Know the security features of the social networking site you use.

5. Do not share password with anyone.


6. Avoid logging in to public networks/Wi-Fi.

7. Do not talk to strangers whether online or face-to-face.

8. Never post anything about future vacation.

9. Add friends you know in real life.

10. Avoid visiting untrusted websites.

11. Install and update an antivirus software on your computer.

12. If you have a Wi-Fi at home, make it a private network by adding password.

13. Avoid downloading anything from untrusted websites.

14. Buy the software; do not use pirated ones.

15. Do not reply or click links from suspicious emails.

INTERNET THREATS

Malware – stands for Malicious Software.

Spam – unwanted email mostly from advertisers.

Phishing – its goal is to acquire sensitive personal information like passwords and credit card details

Malware

Virus – a malicious program designed to replicate itself and transfer from one computer to another.

Worm – a malicious program that transfers from one computer to another by any type of means.

Trojan - a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC
unprotected and allows hacker to get you information

* Rouge security software

Spyware - a program that runs in the background without you knowing it.

* Keyloggers – used to record the keystroke done by the user.

Adware - a program designed to send you advertisements, mostly as pop-ups.

Other Internet Threats

Botnets- a collection of software robots, or “bots” that creates an army of infected computers (zombies)

send spam email with viruses

spread all types of malware

DDos - Distributed denial-of-service

when a malicious user gets a network of zombie computers to sabotage a specific website or server

- the flooding of incoming messages

Protecting Reputations Online


1. Before you post something on the web, ask these questions to yourself:

Would you want your parents or grandparents to see it?

Would you want your future boss to see it?

2. Your friends depend on you to protect their reputation online.

3. Set your post to “private”.

4. Avoid using names.

5. If you feel that a post can affect you or other’s reputation, ask the one who posted it to pull it down or report it as
inappropriate.

Copyright Infringement

Intellectual Property

Copyright Law

Copyright Page “No part of this book may be copied, reproduced……”

1. Understand. Copyright protect literary works, photographs, paintings, drawings, films, music (and lyrics), choreography, and
sculptures.

2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright.

3. Be creative. Ask yourself whether what you are making is something that came from you or something made from somebody
else’s creativity.

4. Know the law. There are some limitations to copyright laws.

Online Research

1 .Have a question in mind. Focus on a question you want answered.

2. Narrow it down. Search engines like Google, Bing, or Yahoo use several filters to determine the most appropriate result for
you.

3. Advanced Search. The best way to filter information you get from search engines is by using the advanced search.

4. Look for a credible sources. Some wikis, filled with updated information, are not a credible source. When using wikis, check
out the link of the cited text.

5. Give credit. Give credit to the original author of the page or information. To properly site a reference, you may use the format
below.

Você também pode gostar